critical infrastructure

Protecting essential services and control systems networks are imperative and in many cases neglected in relation to embedded systems in modern architecture. The proliferation and advancement of operational technologies and the Internet of Things, the convergence of IT and OT have enhanced operational efficiency but paradoxically has increased the attack surface exponentially across the critical […]

#AVCIP2018 Mailing List Protecting essential services and control systems networks in the aviation sector is imperative and in many cases neglected in relation to embedded systems in modern architecture. The proliferation and advancement of operational technologies and the Internet of Things, the convergence of IT and OT have enhanced operational efficiency but paradoxically has […]

As Operational Technology (OT) environments become increasingly interconnected and smarter, organizations face significant digital transformation challenges. The business demand for the raw data and information produced by OT systems is growing exponentially both from an internal and external perspective. As the demand for data increases, so has the volume of cyber-attacks specifically aimed at OT […]

This September in London and October in Sacramento, we learn from Honeywell why USB devices are still the #1 source of malware in ICS. This discussion will help you understand how USB devices can pose a threat even without malware, including: o Surprisingly effective HID attacks o More advanced threats posed by rogue network devices, […]

On September 12th the Cyber Senate will be hosting the European Rail Cyber Security Working Group in a roundtable format with discussion groups in the morning and outcomes presented in the afternoon. Capped at 70 participants, this face to face knowledge sharing exercise is specifically designed to assist all stakeholders in the rail ecosystem with […]

The Cyber Senate are pleased to announce the IAEA will be joining us as Key Note presenters on the Industrial Control Cyber Security Nuclear conference we will be hosting in Warrington UK, May 24-25th 2016. For further information see www.industrialcontrolsecuritynuclear.com

According to Symantec, “A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.” More information can be found on Symantecs blog and we highly suggested familiarising your firm with this latest threat as although it is focused on the Middle East, […]

“The Energy Sector led all others again in 2014 with the most reported incidents” Please find the report here https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf “Of the total number of incidents reported to ICS-CERT, roughly 55 percent involved advanced persistent threats (APT) or sophisticated actors. Other actor types included hacktivists, insider threats, and criminals. In many cases, the threat actors were […]

The Cyber Senate are pleased to announce Mr Marty Edwards, Director ICS CERT, Department of Homeland Security will be joining us as the Key Note speaker on October 13th and 14th in Sacramento California for the 2nd annual Industrial Control Cyber Security USA conference. Assistant Deputy Director, National Cybersecurity and Communications Integration Center (NCCIC) Director, […]

According to Skynews, “some 140 million people were left without electricity after a transmission line was attacked, knocking out the national grid.” Power has been restored to much of Pakistan after more than 140 million people were plunged into darkness due to an apparent rebel attack on a key power line. Up to 80% of […]

“In GCHQ we continue to see real threats to the UK on a daily basis, and I’m afraid the scale and rate of these attacks shows little sign of abating.” Robert Hannigan Director GCHQ http://goo.gl/2RaCGD

We launched our CBTC conference for Engineering Directors in 2014, having noticed and appreciated the vision these leaders possessed in relation to upgrading legacy systems, outdated rolling stock and replacing control systems communication. What really caught my attention, is like Smart Grids, in the name of efficiency ( and in this case increasing capacity infrastructure […]

By Raj Samani , Jim Walter on Jul 02, 2014 Reblogged with permission orginal article here http://blogs.mcafee.com/mcafee-labs/operation-dragonfly-imperils-industrial-protocol Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. […]

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.